Weak password allowed hackers to sink a 158-year-old company - Let this be a lesson...

Link: https://www.bbc.co.uk/news/articles/cx2gx28815wo
Credit: Richard Bilton, BBC Panorama
Archive: https://archive.ph/fbFxo

6a792500-63b5-11f0-8dbd-f3d32ebd3327.jpg.webp

One password is believed to have been all it took for a ransomware gang to destroy a 158-year-old company and put 700 people out of work.

KNP - a Northamptonshire transport company - is just one of tens of thousands of UK businesses that have been hit by such attacks.

Big names such as M&S, Co-op and Harrods have all been attacked in recent months. The chief executive of Co-op confirmed last week that all 6.5 million of its members had had their data stolen.

In KNP's case, it's thought the hackers managed to gain entry to the computer system by guessing an employee's password, after which they encrypted the company's data and locked its internal systems.

KNP director Paul Abbott says he hasn't told the employee that their compromised password most likely led to the destruction of the company.

"Would you want to know if it was you?" he asks.

"We need organisations to take steps to secure their systems, to secure their businesses," says Richard Horne CEO of the National Cyber Security Centre (NCSC) - where Panorama has been given exclusive access to the team battling international ransomware gangs.

One small mistake​


In 2023, KNP was running 500 lorries – most under the brand name Knights of Old.

The company said its IT complied with industry standards and it had taken out insurance against cyber-attack.

But a gang of hackers, known as Akira, got into the system leaving staff unable to access any of the data needed to run the business. The only way to get the data back, said the hackers, was to pay.

8ce439a0-62e7-11f0-b1b9-2b94c1f6d9f3.jpg.webp

Paul Abbott's company KNP was attacked by ransomware hackers

"If you're reading this it means the internal infrastructure of your company is fully or partially dead…Let's keep all the tears and resentment to ourselves and try to build a constructive dialogue," read the ransom note.

The hackers didn't name a price, but a specialist ransomware negotiation firm estimated the sum could be as much as £5m. KNP didn't have that kind of money. In the end all the data was lost, and the company went under.

cb919040-62e6-11f0-b1b9-2b94c1f6d9f3.jpg.webp

When KNP went under 700 people lost their jobs

The National Cyber Security Centre (NCSC) says its goal is "to make the UK the safest place to live and work online". It says it deals with a major attack every day.

The NCSC is part of GCHQ, one of the UK's three main security services alongside MI5 and MI6.

The hackers are not doing anything new, says "Sam" (not his real name), who runs a NCSC team dealing with day-to-day attacks. They are just looking for a weak link, he tells Panorama.

"They're just constantly finding organisations on a bad day and then taking advantage of them."

Using intelligence sources, NCSC operatives try to spot attacks and eject hackers from computer systems before they can deploy ransom software.

"Jake" (not his real name) was night duty officer during a recent incident when hackers were stopped.

"You understand the scale of what's going on and you want to reduce the harm," he says. "It can be thrilling, especially if we're successful."

But the NCSC can only provide one layer of protection, and ransomware is a growing and lucrative crime.

"Part of the problem is there's a lot of attackers," says Sam. "There's not that many of us."

Statistics are hard to come by because companies don't have to report attacks or if they have paid ransoms. However, there were an estimated 19,000 ransomware attacks on UK businesses last year, according to the government's cyber-security survey.

Industry research suggests the typical UK ransom demand is about £4m and that about a third of companies simply pay up.

16bd5150-62f9-11f0-83d2-4f671b8c1523.jpg.webp

Richard Horne, CEO, National Cyber Security Centre, says companies need to step-up and improve their cybersecurity

"We've seen a wave of criminal cyber-attacks over the last few years," says Richard Horne, the NCSC's CEO. He denies the criminals are winning, but says that companies need to improve their cyber-security.

If prevention doesn't work, another team of officers at the National Crime Agency (NCA) has the job of catching the offenders.

Hacking is on the rise because it's such a lucrative crime, says Suzanne Grimmer, who heads a team at the NCA.

Her unit carried out the initial assessment into the M&S hack.

69ecc9f0-62f9-11f0-b903-f515e3045d80.jpg.webp

Suzanne Grimmer, National Crime Agency, says hacking attacks have almost doubled

Incidents have almost doubled to about 35-40 a week since she took over the unit two years ago, Ms Grimmer says.

"If it continues, I predict it's going to be the worst year on record for ransomware attacks in the UK."

Hacking is becoming easier and some of the tactics don't even involve a computer, like ringing an IT helpdesk to gain access.

This has lowered the barrier for potential attacks says Ms Grimmer: "These criminals are becoming far more able to access tools and services that you don't need a specific technical skill set for."

The M&S hackers broke into the company's system by means of blagging or tricking their way into the system. This caused disruption to shoppers when deliveries were delayed, some shelves were left bare, and customer data was also stolen.

James Babbage, Director General (Threats) at the NCA, says it is the characteristic of a younger generation of hackers, who now are "getting into cybercrime probably through gaming".

906bad80-62f9-11f0-b903-f515e3045d80.jpg.webp

James Babbage, Director General (Threats), National Crime Agency, says there is now a new generation of hackers

"They're recognising that their sort of skills can be used to con help desks and the like into getting them access into companies."

Once inside, the hackers can use ransom software, bought on the dark web, to steal data and lock computer systems.

Ransomware is the most significant cyber-crime threat we face, says Mr Babbage.

"It's a national security threat in its own right, both here and throughout the world."

Others have come to the same conclusion.

In December 2023, Parliament's Joint Committee on the National Security Strategy warned there was a high risk of a "catastrophic ransomware attack at any moment".

Earlier this year, the National Audit Office produced a report that said the threat to the UK was severe and advancing quickly.

Companies need to "think about cyber-security in all the decisions they make," says Richard Horne at the NCSC.

Mr Babbage says he would also discourage victims from paying ransoms.

"Every victim needs to make their own choice, but it is the paying of ransoms which fuels this crime," he says.

The government has proposed banning public bodies from paying ransoms.

Private companies might have to report ransom attacks and get government permission to pay up.

Back in Northamptonshire, Paul Abbott of KNP now gives talks warning other businesses about the cyber threat.

He thinks companies should have to prove they have up-to-date IT protection - a sort of "cyber-MOT".

"There needs to be rules that make you much more resilient to criminal activity," he says.

However, many companies are just choosing not to report the crime but simply to pay the criminals, says Paul Cashmore, a cyber-specialist brought in by KNP's insurers.

When faced with losing everything, companies give in to the gangs.

"This is organised crime," he says. "I think there is very little progress against catching the perpetrators, but it's devastating."
 

Attachments

  • cb919040-62e6-11f0-b1b9-2b94c1f6d9f3.jpg.webp
    cb919040-62e6-11f0-b1b9-2b94c1f6d9f3.jpg.webp
    23.8 KB · Views: 3
  • 8ce439a0-62e7-11f0-b1b9-2b94c1f6d9f3.jpg.webp
    8ce439a0-62e7-11f0-b1b9-2b94c1f6d9f3.jpg.webp
    20.8 KB · Views: 4
  • 6a792500-63b5-11f0-8dbd-f3d32ebd3327.jpg.webp
    6a792500-63b5-11f0-8dbd-f3d32ebd3327.jpg.webp
    63 KB · Views: 4
Last edited:
In KNP's case, it's thought the hackers managed to gain entry to the computer system by guessing an employee's password, after which they encrypted the company's data and locked its internal systems.
Is it that easy?

What if this employee gave the password, or what if they intentionally left it as easy to guess so that their accomplices gain control, while absolving themselves of suspicion?

If it wasn't malicious, why wasn't there a measure of forcing them to have a high entropy password? (e.g: using all pool of characters + length of >30)
 
The hackers didn't name a price, but a specialist ransomware negotiation firm estimated the sum could be as much as £5m. KNP didn't have that kind of money. In the end all the data was lost, and the company went under.
My wiggah ever hear of backing up your fucking hard drive?

I mean I do not need to backup my data because my passwords are super secure: Null6969lol will never be cracked but for you normies...maybe keep a snapshot.
 
Coping, weak password didn't lead to the companies collapse.
  • Why was one weak password able to compromise your entire company
  • If this data was so important why wasn't it properly backed up
  • Why were there no plans or policies in place to figure out how to cope with a cyber attack of this level
Infact I'm sure the cyber insurance mentioned asked all of these questions prior in the original application.
 
Last edited:
Is it that easy?

What if this employee gave the password, or what if they intentionally left it as easy to guess so that their accomplices gain control, while absolving themselves of suspicion?

If it wasn't malicious, why wasn't there a measure of forcing them to have a high entropy password? (e.g: using all pool of characters + length of >30)
Somebody cocked up badly and this is the result.

The IT people there must have thought they were still using Windows 95 era tech.
 
My wiggah ever hear of backing up your fucking hard drive?

I mean I do not need to backup my data because my passwords are super secure: Null6969lol will never be cracked but for you normies...maybe keep a snapshot.
Seriously. Beyond my day job, I also manage the highly influential tech startup known as the CWCki and we've got regular backups.

It would be such a loss to humanity if the CWCki shat the bed and we didn't have backups.

An encyclopedia about a retarded motherfucker has better tech infrastructure (and I really do my best to completely ignore it and forget about its existence) than some major UK companies.

Really makes u think...
 
Coping, weak password didn't lead to the companies collapse.

  • Why was one weak password able to compromise your entire company
  • If this data was so important why wasn't it properly backed up
  • Why were there no plans or policies in place to figure out how to cope with a cyber attack of this level
Infact I'm sure the cyber insurance mentioned asked all of these questions prior in the original application.
It sounds more like the company was already going under and they used the hacking as an excuse. £5m isn't a lot of money for a business that employed 700 people. If they weren't able to raise that they were already over leveraged.
 
Modern IT uses stuff like storage snapshotting and immutable backups, offsite backups, etc, to guard specifically against this scenario, where it's literally impossible for anybody to fuck with backed up data no matter what admin level access they've gotten. Even if, say, someone got into your storage controller and changed the passwords to lock you out, they can't delete the snapshots, so it's just a matter of driving over to the datacenter and yanking the plug on it, logging in locally, and restoring from a pre-fuckery snapshot to get things back into a functional state so you can go through and clean out whatever hooks the people put in your system. It's still an obnoxious assload of work, but better than everything being encrypted.
 
Back in Northamptonshire, Paul Abbott of KNP now gives talks warning other businesses about the cyber threat.

He thinks companies should have to prove they have up-to-date IT protection - a sort of "cyber-MOT".

"There needs to be rules that make you much more resilient to criminal activity," he says.
Perhaps more than tea, the Englishman loves nothing quite so much as the taste of government boot.
 
It sounds more like the company was already going under and they used the hacking as an excuse. £5m isn't a lot of money for a business that employed 700 people. If they weren't able to raise that they were already over leveraged.
And apparently they didn't even talk to them -
The hackers didn't name a price, but a specialist ransomware negotiation firm estimated the sum could be as much as £5m.
- they just threw their hands up and said "Welp, guess we're out of business now". Also, "specialist ransomware negotiation firm"? Really? That's very specialized.

I can believe that they were that stupid - I've worked with a few logistics & logistics adjacent firms over the years, and IT is definitely something that happens to other people - but a lot of the details of this story have the distinct aroma of bullshit.
 
Modern IT uses stuff like storage snapshotting and immutable backups, offsite backups, etc, to guard specifically against this scenario, where it's literally impossible for anybody to fuck with backed up data no matter what admin level access they've gotten. Even if, say, someone got into your storage controller and changed the passwords to lock you out, they can't delete the snapshots, so it's just a matter of driving over to the datacenter and yanking the plug on it, logging in locally, and restoring from a pre-fuckery snapshot to get things back into a functional state so you can go through and clean out whatever hooks the people put in your system. It's still an obnoxious assload of work, but better than everything being encrypted.
You also need to make sure that your setup actually works. Ain't nothing like smugly firing up the restore console and realizing that the last sane backup was 7 months ago before a configuration change resulted in critically important shares being left out of the backup loop and all you have on hand is 300 TB worth of vaguely nice-to-have stuff.
 
Modern IT uses stuff like storage snapshotting and immutable backups, offsite backups, etc, to guard specifically against this scenario,
Even in the pre-digital age? Companies routinely made dumps to off-site storage of copies of their records so that no singular catastrophe could ever wipe them all. Only purging them for good when they hit 5 - 10 year old status and were therefore unlikely to be critical any longer. There's a reason those big boxes for archived files are called "bankers boxes". Its inexcusable to run a business with no backup plan for your data, whatever form it takes.
 
Back